語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber security essentials[electronic...
~
Graham, James
Cyber security essentials[electronic resource] /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
杜威分類號:
005.8
書名/作者:
Cyber security essentials/ edited by James Graham, Richard Howard, Ryan Olson.
其他作者:
Graham, James
出版者:
Boca Raton, FL : : Auerbach Publications :, c2010.
面頁冊數:
1 online resource (xv, 325 p.) : : ill.
標題:
Computer security.
ISBN:
9781439851265
ISBN:
1439851263
書目註:
Includes bibliographical references and index.
內容註:
Ch. 1. Cyber security fundamentals -- ch. 2. Attacker techniques and motivations -- ch. 3. Exploitation -- ch. 4. Malicious code -- ch. 5. Defense and analysis techniques -- ch. 6. iDefense special file investigation tools.
摘要、提要註:
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--
電子資源:
http://www.crcnetbase.com/isbn/9781439851265
Cyber security essentials[electronic resource] /
Cyber security essentials
[electronic resource] /edited by James Graham, Richard Howard, Ryan Olson. - Boca Raton, FL :Auerbach Publications :c2010. - 1 online resource (xv, 325 p.) :ill.
Includes bibliographical references and index.
Ch. 1. Cyber security fundamentals -- ch. 2. Attacker techniques and motivations -- ch. 3. Exploitation -- ch. 4. Malicious code -- ch. 5. Defense and analysis techniques -- ch. 6. iDefense special file investigation tools.
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--
ISBN: 9781439851265
LCCN: 2010044845Subjects--Topical Terms:
338952
Computer security.
Index Terms--Genre/Form:
336502
Electronic books.
LC Class. No.: QA76.9.A25 / C91915 2011eb
Dewey Class. No.: 005.8
Cyber security essentials[electronic resource] /
LDR
:01940cam a2200301Ia 4500
001
427866
003
OCoLC
005
20151105030112.0
006
m o d
007
cr cnu---unuuu
008
151130s2010 flua ob 001 0 eng d
010
$a
2010044845
020
$a
9781439851265
$q
(electronic bk.)
020
$a
1439851263
$q
(electronic bk.)
020
$z
9781439851234
020
$z
1439851239
035
$a
(OCoLC)701052769
$z
(OCoLC)708566090
$z
(OCoLC)780494539
035
$a
ocn701052769
040
$a
N
$b
eng
$c
N
$d
OCLCQ
$d
YDXCP
$d
CUS
$d
OCLCQ
$d
GZM
$d
EBLCP
$d
OCLCQ
$d
UA@
$d
OCLCA
$d
OCLCF
$d
DEBSZ
$d
OCLCQ
$d
S4S
$d
CRCPR
$d
OCLCQ
$d
E7B
050
4
$a
QA76.9.A25
$b
C91915 2011eb
082
0 4
$a
005.8
$2
22
245
0 0
$a
Cyber security essentials
$h
[electronic resource] /
$c
edited by James Graham, Richard Howard, Ryan Olson.
260
$a
Boca Raton, FL :
$b
Auerbach Publications :
$b
CRC Press,
$c
c2010.
300
$a
1 online resource (xv, 325 p.) :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0
$a
Ch. 1. Cyber security fundamentals -- ch. 2. Attacker techniques and motivations -- ch. 3. Exploitation -- ch. 4. Malicious code -- ch. 5. Defense and analysis techniques -- ch. 6. iDefense special file investigation tools.
520
$a
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--
$c
Provided by publisher.
588
0
$a
Print version record.
650
0
$a
Computer security.
$3
338952
655
0
$a
Electronic books.
$2
local
$3
336502
700
1
$a
Graham, James
$q
(James John George)
$3
441365
700
1
$a
Howard, Richard,
$d
1959-
$3
609078
700
1
$a
Olson, Ryan,
$d
1981-
$3
609079
856
4 0
$u
http://www.crcnetbase.com/isbn/9781439851265
筆 0 讀者評論
多媒體
多媒體檔案
http://www.crcnetbase.com/isbn/9781439851265
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入